pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,298 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import sys
|
8
|
+
import pulumi
|
9
|
+
import pulumi.runtime
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
|
+
from . import _utilities
|
16
|
+
|
17
|
+
__all__ = ['PluginPinnedVersionArgs', 'PluginPinnedVersion']
|
18
|
+
|
19
|
+
@pulumi.input_type
|
20
|
+
class PluginPinnedVersionArgs:
|
21
|
+
def __init__(__self__, *,
|
22
|
+
type: pulumi.Input[str],
|
23
|
+
version: pulumi.Input[str],
|
24
|
+
name: Optional[pulumi.Input[str]] = None):
|
25
|
+
"""
|
26
|
+
The set of arguments for constructing a PluginPinnedVersion resource.
|
27
|
+
:param pulumi.Input[str] type: Type of plugin; one of "auth", "secret", or "database".
|
28
|
+
:param pulumi.Input[str] version: Semantic version of the plugin to pin.
|
29
|
+
:param pulumi.Input[str] name: Name of the plugin.
|
30
|
+
"""
|
31
|
+
pulumi.set(__self__, "type", type)
|
32
|
+
pulumi.set(__self__, "version", version)
|
33
|
+
if name is not None:
|
34
|
+
pulumi.set(__self__, "name", name)
|
35
|
+
|
36
|
+
@property
|
37
|
+
@pulumi.getter
|
38
|
+
def type(self) -> pulumi.Input[str]:
|
39
|
+
"""
|
40
|
+
Type of plugin; one of "auth", "secret", or "database".
|
41
|
+
"""
|
42
|
+
return pulumi.get(self, "type")
|
43
|
+
|
44
|
+
@type.setter
|
45
|
+
def type(self, value: pulumi.Input[str]):
|
46
|
+
pulumi.set(self, "type", value)
|
47
|
+
|
48
|
+
@property
|
49
|
+
@pulumi.getter
|
50
|
+
def version(self) -> pulumi.Input[str]:
|
51
|
+
"""
|
52
|
+
Semantic version of the plugin to pin.
|
53
|
+
"""
|
54
|
+
return pulumi.get(self, "version")
|
55
|
+
|
56
|
+
@version.setter
|
57
|
+
def version(self, value: pulumi.Input[str]):
|
58
|
+
pulumi.set(self, "version", value)
|
59
|
+
|
60
|
+
@property
|
61
|
+
@pulumi.getter
|
62
|
+
def name(self) -> Optional[pulumi.Input[str]]:
|
63
|
+
"""
|
64
|
+
Name of the plugin.
|
65
|
+
"""
|
66
|
+
return pulumi.get(self, "name")
|
67
|
+
|
68
|
+
@name.setter
|
69
|
+
def name(self, value: Optional[pulumi.Input[str]]):
|
70
|
+
pulumi.set(self, "name", value)
|
71
|
+
|
72
|
+
|
73
|
+
@pulumi.input_type
|
74
|
+
class _PluginPinnedVersionState:
|
75
|
+
def __init__(__self__, *,
|
76
|
+
name: Optional[pulumi.Input[str]] = None,
|
77
|
+
type: Optional[pulumi.Input[str]] = None,
|
78
|
+
version: Optional[pulumi.Input[str]] = None):
|
79
|
+
"""
|
80
|
+
Input properties used for looking up and filtering PluginPinnedVersion resources.
|
81
|
+
:param pulumi.Input[str] name: Name of the plugin.
|
82
|
+
:param pulumi.Input[str] type: Type of plugin; one of "auth", "secret", or "database".
|
83
|
+
:param pulumi.Input[str] version: Semantic version of the plugin to pin.
|
84
|
+
"""
|
85
|
+
if name is not None:
|
86
|
+
pulumi.set(__self__, "name", name)
|
87
|
+
if type is not None:
|
88
|
+
pulumi.set(__self__, "type", type)
|
89
|
+
if version is not None:
|
90
|
+
pulumi.set(__self__, "version", version)
|
91
|
+
|
92
|
+
@property
|
93
|
+
@pulumi.getter
|
94
|
+
def name(self) -> Optional[pulumi.Input[str]]:
|
95
|
+
"""
|
96
|
+
Name of the plugin.
|
97
|
+
"""
|
98
|
+
return pulumi.get(self, "name")
|
99
|
+
|
100
|
+
@name.setter
|
101
|
+
def name(self, value: Optional[pulumi.Input[str]]):
|
102
|
+
pulumi.set(self, "name", value)
|
103
|
+
|
104
|
+
@property
|
105
|
+
@pulumi.getter
|
106
|
+
def type(self) -> Optional[pulumi.Input[str]]:
|
107
|
+
"""
|
108
|
+
Type of plugin; one of "auth", "secret", or "database".
|
109
|
+
"""
|
110
|
+
return pulumi.get(self, "type")
|
111
|
+
|
112
|
+
@type.setter
|
113
|
+
def type(self, value: Optional[pulumi.Input[str]]):
|
114
|
+
pulumi.set(self, "type", value)
|
115
|
+
|
116
|
+
@property
|
117
|
+
@pulumi.getter
|
118
|
+
def version(self) -> Optional[pulumi.Input[str]]:
|
119
|
+
"""
|
120
|
+
Semantic version of the plugin to pin.
|
121
|
+
"""
|
122
|
+
return pulumi.get(self, "version")
|
123
|
+
|
124
|
+
@version.setter
|
125
|
+
def version(self, value: Optional[pulumi.Input[str]]):
|
126
|
+
pulumi.set(self, "version", value)
|
127
|
+
|
128
|
+
|
129
|
+
class PluginPinnedVersion(pulumi.CustomResource):
|
130
|
+
@overload
|
131
|
+
def __init__(__self__,
|
132
|
+
resource_name: str,
|
133
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
134
|
+
name: Optional[pulumi.Input[str]] = None,
|
135
|
+
type: Optional[pulumi.Input[str]] = None,
|
136
|
+
version: Optional[pulumi.Input[str]] = None,
|
137
|
+
__props__=None):
|
138
|
+
"""
|
139
|
+
## Example Usage
|
140
|
+
|
141
|
+
```python
|
142
|
+
import pulumi
|
143
|
+
import pulumi_vault as vault
|
144
|
+
|
145
|
+
jwt = vault.Plugin("jwt",
|
146
|
+
type="auth",
|
147
|
+
name="jwt",
|
148
|
+
command="vault-plugin-auth-jwt",
|
149
|
+
version="v0.17.0",
|
150
|
+
sha256="6bd0a803ed742aa3ce35e4fa23d2c8d550e6c1567bf63410cec489c28b68b0fc",
|
151
|
+
envs=["HTTP_PROXY=http://proxy.example.com:8080"])
|
152
|
+
jwt_pin = vault.PluginPinnedVersion("jwt_pin",
|
153
|
+
type=jwt.type,
|
154
|
+
name=jwt.name,
|
155
|
+
version=jwt.version)
|
156
|
+
jwt_auth = vault.AuthBackend("jwt_auth", type=jwt_pin.name)
|
157
|
+
```
|
158
|
+
|
159
|
+
## Import
|
160
|
+
|
161
|
+
Pinned plugin versions can be imported using `type/name` as the ID, e.g.
|
162
|
+
|
163
|
+
```sh
|
164
|
+
$ pulumi import vault:index/pluginPinnedVersion:PluginPinnedVersion jwt_pin auth/jwt
|
165
|
+
```
|
166
|
+
|
167
|
+
:param str resource_name: The name of the resource.
|
168
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
169
|
+
:param pulumi.Input[str] name: Name of the plugin.
|
170
|
+
:param pulumi.Input[str] type: Type of plugin; one of "auth", "secret", or "database".
|
171
|
+
:param pulumi.Input[str] version: Semantic version of the plugin to pin.
|
172
|
+
"""
|
173
|
+
...
|
174
|
+
@overload
|
175
|
+
def __init__(__self__,
|
176
|
+
resource_name: str,
|
177
|
+
args: PluginPinnedVersionArgs,
|
178
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
179
|
+
"""
|
180
|
+
## Example Usage
|
181
|
+
|
182
|
+
```python
|
183
|
+
import pulumi
|
184
|
+
import pulumi_vault as vault
|
185
|
+
|
186
|
+
jwt = vault.Plugin("jwt",
|
187
|
+
type="auth",
|
188
|
+
name="jwt",
|
189
|
+
command="vault-plugin-auth-jwt",
|
190
|
+
version="v0.17.0",
|
191
|
+
sha256="6bd0a803ed742aa3ce35e4fa23d2c8d550e6c1567bf63410cec489c28b68b0fc",
|
192
|
+
envs=["HTTP_PROXY=http://proxy.example.com:8080"])
|
193
|
+
jwt_pin = vault.PluginPinnedVersion("jwt_pin",
|
194
|
+
type=jwt.type,
|
195
|
+
name=jwt.name,
|
196
|
+
version=jwt.version)
|
197
|
+
jwt_auth = vault.AuthBackend("jwt_auth", type=jwt_pin.name)
|
198
|
+
```
|
199
|
+
|
200
|
+
## Import
|
201
|
+
|
202
|
+
Pinned plugin versions can be imported using `type/name` as the ID, e.g.
|
203
|
+
|
204
|
+
```sh
|
205
|
+
$ pulumi import vault:index/pluginPinnedVersion:PluginPinnedVersion jwt_pin auth/jwt
|
206
|
+
```
|
207
|
+
|
208
|
+
:param str resource_name: The name of the resource.
|
209
|
+
:param PluginPinnedVersionArgs args: The arguments to use to populate this resource's properties.
|
210
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
211
|
+
"""
|
212
|
+
...
|
213
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
214
|
+
resource_args, opts = _utilities.get_resource_args_opts(PluginPinnedVersionArgs, pulumi.ResourceOptions, *args, **kwargs)
|
215
|
+
if resource_args is not None:
|
216
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
217
|
+
else:
|
218
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
219
|
+
|
220
|
+
def _internal_init(__self__,
|
221
|
+
resource_name: str,
|
222
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
223
|
+
name: Optional[pulumi.Input[str]] = None,
|
224
|
+
type: Optional[pulumi.Input[str]] = None,
|
225
|
+
version: Optional[pulumi.Input[str]] = None,
|
226
|
+
__props__=None):
|
227
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
228
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
229
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
230
|
+
if opts.id is None:
|
231
|
+
if __props__ is not None:
|
232
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
233
|
+
__props__ = PluginPinnedVersionArgs.__new__(PluginPinnedVersionArgs)
|
234
|
+
|
235
|
+
__props__.__dict__["name"] = name
|
236
|
+
if type is None and not opts.urn:
|
237
|
+
raise TypeError("Missing required property 'type'")
|
238
|
+
__props__.__dict__["type"] = type
|
239
|
+
if version is None and not opts.urn:
|
240
|
+
raise TypeError("Missing required property 'version'")
|
241
|
+
__props__.__dict__["version"] = version
|
242
|
+
super(PluginPinnedVersion, __self__).__init__(
|
243
|
+
'vault:index/pluginPinnedVersion:PluginPinnedVersion',
|
244
|
+
resource_name,
|
245
|
+
__props__,
|
246
|
+
opts)
|
247
|
+
|
248
|
+
@staticmethod
|
249
|
+
def get(resource_name: str,
|
250
|
+
id: pulumi.Input[str],
|
251
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
252
|
+
name: Optional[pulumi.Input[str]] = None,
|
253
|
+
type: Optional[pulumi.Input[str]] = None,
|
254
|
+
version: Optional[pulumi.Input[str]] = None) -> 'PluginPinnedVersion':
|
255
|
+
"""
|
256
|
+
Get an existing PluginPinnedVersion resource's state with the given name, id, and optional extra
|
257
|
+
properties used to qualify the lookup.
|
258
|
+
|
259
|
+
:param str resource_name: The unique name of the resulting resource.
|
260
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
261
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
262
|
+
:param pulumi.Input[str] name: Name of the plugin.
|
263
|
+
:param pulumi.Input[str] type: Type of plugin; one of "auth", "secret", or "database".
|
264
|
+
:param pulumi.Input[str] version: Semantic version of the plugin to pin.
|
265
|
+
"""
|
266
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
267
|
+
|
268
|
+
__props__ = _PluginPinnedVersionState.__new__(_PluginPinnedVersionState)
|
269
|
+
|
270
|
+
__props__.__dict__["name"] = name
|
271
|
+
__props__.__dict__["type"] = type
|
272
|
+
__props__.__dict__["version"] = version
|
273
|
+
return PluginPinnedVersion(resource_name, opts=opts, __props__=__props__)
|
274
|
+
|
275
|
+
@property
|
276
|
+
@pulumi.getter
|
277
|
+
def name(self) -> pulumi.Output[str]:
|
278
|
+
"""
|
279
|
+
Name of the plugin.
|
280
|
+
"""
|
281
|
+
return pulumi.get(self, "name")
|
282
|
+
|
283
|
+
@property
|
284
|
+
@pulumi.getter
|
285
|
+
def type(self) -> pulumi.Output[str]:
|
286
|
+
"""
|
287
|
+
Type of plugin; one of "auth", "secret", or "database".
|
288
|
+
"""
|
289
|
+
return pulumi.get(self, "type")
|
290
|
+
|
291
|
+
@property
|
292
|
+
@pulumi.getter
|
293
|
+
def version(self) -> pulumi.Output[str]:
|
294
|
+
"""
|
295
|
+
Semantic version of the plugin to pin.
|
296
|
+
"""
|
297
|
+
return pulumi.get(self, "version")
|
298
|
+
|
pulumi_vault/policy.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['PolicyArgs', 'Policy']
|
@@ -23,7 +28,7 @@ class PolicyArgs:
|
|
23
28
|
:param pulumi.Input[str] name: The name of the policy
|
24
29
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
25
30
|
The value should not contain leading or trailing forward slashes.
|
26
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
31
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
27
32
|
*Available only for Vault Enterprise*.
|
28
33
|
"""
|
29
34
|
pulumi.set(__self__, "policy", policy)
|
@@ -62,7 +67,7 @@ class PolicyArgs:
|
|
62
67
|
"""
|
63
68
|
The namespace to provision the resource in.
|
64
69
|
The value should not contain leading or trailing forward slashes.
|
65
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
70
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
66
71
|
*Available only for Vault Enterprise*.
|
67
72
|
"""
|
68
73
|
return pulumi.get(self, "namespace")
|
@@ -83,7 +88,7 @@ class _PolicyState:
|
|
83
88
|
:param pulumi.Input[str] name: The name of the policy
|
84
89
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
85
90
|
The value should not contain leading or trailing forward slashes.
|
86
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
91
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
87
92
|
*Available only for Vault Enterprise*.
|
88
93
|
:param pulumi.Input[str] policy: String containing a Vault policy
|
89
94
|
"""
|
@@ -112,7 +117,7 @@ class _PolicyState:
|
|
112
117
|
"""
|
113
118
|
The namespace to provision the resource in.
|
114
119
|
The value should not contain leading or trailing forward slashes.
|
115
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
120
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
116
121
|
*Available only for Vault Enterprise*.
|
117
122
|
"""
|
118
123
|
return pulumi.get(self, "namespace")
|
@@ -157,7 +162,7 @@ class Policy(pulumi.CustomResource):
|
|
157
162
|
:param pulumi.Input[str] name: The name of the policy
|
158
163
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
159
164
|
The value should not contain leading or trailing forward slashes.
|
160
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
165
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
161
166
|
*Available only for Vault Enterprise*.
|
162
167
|
:param pulumi.Input[str] policy: String containing a Vault policy
|
163
168
|
"""
|
@@ -231,7 +236,7 @@ class Policy(pulumi.CustomResource):
|
|
231
236
|
:param pulumi.Input[str] name: The name of the policy
|
232
237
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
233
238
|
The value should not contain leading or trailing forward slashes.
|
234
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
239
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
235
240
|
*Available only for Vault Enterprise*.
|
236
241
|
:param pulumi.Input[str] policy: String containing a Vault policy
|
237
242
|
"""
|
@@ -258,7 +263,7 @@ class Policy(pulumi.CustomResource):
|
|
258
263
|
"""
|
259
264
|
The namespace to provision the resource in.
|
260
265
|
The value should not contain leading or trailing forward slashes.
|
261
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
266
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
262
267
|
*Available only for Vault Enterprise*.
|
263
268
|
"""
|
264
269
|
return pulumi.get(self, "namespace")
|
pulumi_vault/provider.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
from ._inputs import *
|
12
17
|
|
@@ -49,7 +54,6 @@ class ProviderArgs:
|
|
49
54
|
The set of arguments for constructing a Provider resource.
|
50
55
|
:param pulumi.Input[str] address: URL of the root of the target Vault server.
|
51
56
|
:param pulumi.Input[str] token: Token to use to authenticate to Vault.
|
52
|
-
:param pulumi.Input[str] add_address_to_env: If true, adds the value of the `address` argument to the Terraform process environment.
|
53
57
|
:param pulumi.Input['ProviderAuthLoginArgs'] auth_login: Login to vault with an existing auth method using auth/<mount>/login
|
54
58
|
:param pulumi.Input['ProviderAuthLoginAwsArgs'] auth_login_aws: Login to vault using the AWS method
|
55
59
|
:param pulumi.Input['ProviderAuthLoginAzureArgs'] auth_login_azure: Login to vault using the azure method
|
@@ -174,9 +178,6 @@ class ProviderArgs:
|
|
174
178
|
@property
|
175
179
|
@pulumi.getter(name="addAddressToEnv")
|
176
180
|
def add_address_to_env(self) -> Optional[pulumi.Input[str]]:
|
177
|
-
"""
|
178
|
-
If true, adds the value of the `address` argument to the Terraform process environment.
|
179
|
-
"""
|
180
181
|
return pulumi.get(self, "add_address_to_env")
|
181
182
|
|
182
183
|
@add_address_to_env.setter
|
@@ -353,13 +354,11 @@ class ProviderArgs:
|
|
353
354
|
|
354
355
|
@property
|
355
356
|
@pulumi.getter(name="clientAuth")
|
357
|
+
@_utilities.deprecated("""Use auth_login_cert instead""")
|
356
358
|
def client_auth(self) -> Optional[pulumi.Input['ProviderClientAuthArgs']]:
|
357
359
|
"""
|
358
360
|
Client authentication credentials.
|
359
361
|
"""
|
360
|
-
warnings.warn("""Use auth_login_cert instead""", DeprecationWarning)
|
361
|
-
pulumi.log.warn("""client_auth is deprecated: Use auth_login_cert instead""")
|
362
|
-
|
363
362
|
return pulumi.get(self, "client_auth")
|
364
363
|
|
365
364
|
@client_auth.setter
|
@@ -519,22 +518,22 @@ class Provider(pulumi.ProviderResource):
|
|
519
518
|
opts: Optional[pulumi.ResourceOptions] = None,
|
520
519
|
add_address_to_env: Optional[pulumi.Input[str]] = None,
|
521
520
|
address: Optional[pulumi.Input[str]] = None,
|
522
|
-
auth_login: Optional[pulumi.Input[
|
523
|
-
auth_login_aws: Optional[pulumi.Input[
|
524
|
-
auth_login_azure: Optional[pulumi.Input[
|
525
|
-
auth_login_cert: Optional[pulumi.Input[
|
526
|
-
auth_login_gcp: Optional[pulumi.Input[
|
527
|
-
auth_login_jwt: Optional[pulumi.Input[
|
528
|
-
auth_login_kerberos: Optional[pulumi.Input[
|
529
|
-
auth_login_oci: Optional[pulumi.Input[
|
530
|
-
auth_login_oidc: Optional[pulumi.Input[
|
531
|
-
auth_login_radius: Optional[pulumi.Input[
|
532
|
-
auth_login_token_file: Optional[pulumi.Input[
|
533
|
-
auth_login_userpass: Optional[pulumi.Input[
|
521
|
+
auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
|
522
|
+
auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
|
523
|
+
auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
|
524
|
+
auth_login_cert: Optional[pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']]] = None,
|
525
|
+
auth_login_gcp: Optional[pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']]] = None,
|
526
|
+
auth_login_jwt: Optional[pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']]] = None,
|
527
|
+
auth_login_kerberos: Optional[pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']]] = None,
|
528
|
+
auth_login_oci: Optional[pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']]] = None,
|
529
|
+
auth_login_oidc: Optional[pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']]] = None,
|
530
|
+
auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
|
531
|
+
auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
|
532
|
+
auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
|
534
533
|
ca_cert_dir: Optional[pulumi.Input[str]] = None,
|
535
534
|
ca_cert_file: Optional[pulumi.Input[str]] = None,
|
536
|
-
client_auth: Optional[pulumi.Input[
|
537
|
-
headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
535
|
+
client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
|
536
|
+
headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
|
538
537
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
539
538
|
max_retries: Optional[pulumi.Input[int]] = None,
|
540
539
|
max_retries_ccc: Optional[pulumi.Input[int]] = None,
|
@@ -556,24 +555,23 @@ class Provider(pulumi.ProviderResource):
|
|
556
555
|
|
557
556
|
:param str resource_name: The name of the resource.
|
558
557
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
559
|
-
:param pulumi.Input[str] add_address_to_env: If true, adds the value of the `address` argument to the Terraform process environment.
|
560
558
|
:param pulumi.Input[str] address: URL of the root of the target Vault server.
|
561
|
-
:param pulumi.Input[
|
562
|
-
:param pulumi.Input[
|
563
|
-
:param pulumi.Input[
|
564
|
-
:param pulumi.Input[
|
565
|
-
:param pulumi.Input[
|
566
|
-
:param pulumi.Input[
|
567
|
-
:param pulumi.Input[
|
568
|
-
:param pulumi.Input[
|
569
|
-
:param pulumi.Input[
|
570
|
-
:param pulumi.Input[
|
571
|
-
:param pulumi.Input[
|
572
|
-
:param pulumi.Input[
|
559
|
+
:param pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']] auth_login: Login to vault with an existing auth method using auth/<mount>/login
|
560
|
+
:param pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']] auth_login_aws: Login to vault using the AWS method
|
561
|
+
:param pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']] auth_login_azure: Login to vault using the azure method
|
562
|
+
:param pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']] auth_login_cert: Login to vault using the cert method
|
563
|
+
:param pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']] auth_login_gcp: Login to vault using the gcp method
|
564
|
+
:param pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']] auth_login_jwt: Login to vault using the jwt method
|
565
|
+
:param pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']] auth_login_kerberos: Login to vault using the kerberos method
|
566
|
+
:param pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']] auth_login_oci: Login to vault using the OCI method
|
567
|
+
:param pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']] auth_login_oidc: Login to vault using the oidc method
|
568
|
+
:param pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']] auth_login_radius: Login to vault using the radius method
|
569
|
+
:param pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']] auth_login_token_file: Login to vault using
|
570
|
+
:param pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']] auth_login_userpass: Login to vault using the userpass method
|
573
571
|
:param pulumi.Input[str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
|
574
572
|
:param pulumi.Input[str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
|
575
|
-
:param pulumi.Input[
|
576
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
573
|
+
:param pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']] client_auth: Client authentication credentials.
|
574
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]] headers: The headers to send with each Vault request.
|
577
575
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
|
578
576
|
:param pulumi.Input[int] max_retries: Maximum number of retries when a 5xx error code is encountered.
|
579
577
|
:param pulumi.Input[int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
|
@@ -617,22 +615,22 @@ class Provider(pulumi.ProviderResource):
|
|
617
615
|
opts: Optional[pulumi.ResourceOptions] = None,
|
618
616
|
add_address_to_env: Optional[pulumi.Input[str]] = None,
|
619
617
|
address: Optional[pulumi.Input[str]] = None,
|
620
|
-
auth_login: Optional[pulumi.Input[
|
621
|
-
auth_login_aws: Optional[pulumi.Input[
|
622
|
-
auth_login_azure: Optional[pulumi.Input[
|
623
|
-
auth_login_cert: Optional[pulumi.Input[
|
624
|
-
auth_login_gcp: Optional[pulumi.Input[
|
625
|
-
auth_login_jwt: Optional[pulumi.Input[
|
626
|
-
auth_login_kerberos: Optional[pulumi.Input[
|
627
|
-
auth_login_oci: Optional[pulumi.Input[
|
628
|
-
auth_login_oidc: Optional[pulumi.Input[
|
629
|
-
auth_login_radius: Optional[pulumi.Input[
|
630
|
-
auth_login_token_file: Optional[pulumi.Input[
|
631
|
-
auth_login_userpass: Optional[pulumi.Input[
|
618
|
+
auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
|
619
|
+
auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
|
620
|
+
auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
|
621
|
+
auth_login_cert: Optional[pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']]] = None,
|
622
|
+
auth_login_gcp: Optional[pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']]] = None,
|
623
|
+
auth_login_jwt: Optional[pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']]] = None,
|
624
|
+
auth_login_kerberos: Optional[pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']]] = None,
|
625
|
+
auth_login_oci: Optional[pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']]] = None,
|
626
|
+
auth_login_oidc: Optional[pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']]] = None,
|
627
|
+
auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
|
628
|
+
auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
|
629
|
+
auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
|
632
630
|
ca_cert_dir: Optional[pulumi.Input[str]] = None,
|
633
631
|
ca_cert_file: Optional[pulumi.Input[str]] = None,
|
634
|
-
client_auth: Optional[pulumi.Input[
|
635
|
-
headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
632
|
+
client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
|
633
|
+
headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
|
636
634
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
637
635
|
max_retries: Optional[pulumi.Input[int]] = None,
|
638
636
|
max_retries_ccc: Optional[pulumi.Input[int]] = None,
|
@@ -703,9 +701,6 @@ class Provider(pulumi.ProviderResource):
|
|
703
701
|
@property
|
704
702
|
@pulumi.getter(name="addAddressToEnv")
|
705
703
|
def add_address_to_env(self) -> pulumi.Output[Optional[str]]:
|
706
|
-
"""
|
707
|
-
If true, adds the value of the `address` argument to the Terraform process environment.
|
708
|
-
"""
|
709
704
|
return pulumi.get(self, "add_address_to_env")
|
710
705
|
|
711
706
|
@property
|
pulumi_vault/pulumi-plugin.json
CHANGED